Maximizing Lifetime Vector in Wireless Sensor Networks

Size: px
Start display at page:

Download "Maximizing Lifetime Vector in Wireless Sensor Networks"

Transcription

1 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 21, NO. 4, AUGUST Maximizing Lifetime Vector in Wireless Sensor Networks Liang Zhang, Shigang Chen, Senior Member, IEEE, Member, ACM, Ying Jian, Yuguang Fang, Fellow, IEEE, Member, ACM, and ZhenMo Abstract Maximizing the lifetime of a sensor network has been a subject of intensive study. However, much prior work defines the network lifetime as the time before the first data-generating sensor in the network runs out of energy or is not reachable to the sink due to network partition. The problem is that even though one sensor is out of operation, the rest of the network may well remain operational, with other sensors generating useful data and delivering those data to the sink. Hence, instead of just maximizing the time before the first sensor is out of operation, we should maximize the lifetime vector of the network, consisting of the lifetimes of all sensors, sorted in ascending order. For this problem, there exists only a centralized algorithm that solves a series of linear programming problems with high-order complexities. This paper proposes a fully distributed algorithm that runs iteratively. Each iteration produces a lifetime vector that is better than the vector produced by the previous iteration. Instead of giving the optimal result in one shot after lengthy computation, the proposed distributed algorithm has a result at any time, and the more time spent gives the better result. We show that when the algorithm stabilizes, its result produces the maximum lifetimevector.furthermore,simulations demonstrate that the algorithm is able to converge rapidly toward the maximum lifetime vector with low overhead. Index Terms Network lifetime, sensor networks. I. INTRODUCTION WE STUDY the problem of maximizing the lifetime of long-term low-rate monitoring sensor networks that collect data from fields for ecosystem study, environmental monitoring, seismic measurement, etc. Such sensor networks are designed to gather tens of thousands of data points from each selected location over a period of weeks or months. Battery-powered sensor nodes are limited in computation capability, memory space, communication bandwidth, and, above all, energy supply. A sensor network cannot carry out its task after the nodes energy is exhausted. Hence, maximizing the operational lifetime of a sensor network is critical. The lifetime maximization problem has received a lot of investigation in the past under different definitions of lifetime Manuscript received September 10, 2011; revised July 19, 2012; accepted September 04, 2012; approved by IEEE/ACM TRANSACTIONS ON NETWORKING Editor M. Liu. Date of publication December 11, 2012; date of current version August 14, This work was supported in part by the US National Science Foundation under Grants CPS and CNS L. Zhang is with Juniper Networks, Sunnyvale, CA USA ( liangz@juniper.net). S. Chen and Z. Mo are with the Department of Computer and Information Science and Engineering, University of Florida, Gainesville, FL USA ( {sgchen, zmo}@cise.ufl.edu). Y. Jian is with Google, Mountain View, CA USA ( yingj@google.com). Y. Fang is with the Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL USA ( fang@ece.ufl.edu). Digital Object Identifier /TNET for a sensor network. Much prior work tries to maximize the time before the first sensor in the network runs out of energy [1] [8]. Others maximize the time before the energy of the first replay node is depleted [9], the time before the first loss of coverage [10], [11], or the time before the network is partitioned [12]. Also related are the studies that prolong the average node lifetime [13] or the time before a certain percentage of nodes run out of power [14], although they do not maximize the minimum lifetime in the network. In reality, the operational lifetime of the network is not limited to the smallest lifetime of all nodes. When one sensor is out of operation or a few sensors are partitioned from the sink, the rest of the network can still work, as long as useful data generated by other sensors can reach the sink. We believe the lifetime of a sensor network should include the lifetimes of all sensors that produce useful data. A sensor s lifetime is the duration from the time when it begins to generate the first data packet to the time when it generates the last packet that is deliverable to the sink. The network lifetime can be defined as the vector of all sensors lifetimes sorted in ascending order, which is called the lifetime vector. The value of the lifetime vector is determined by the nodes forwarding policies that specify how packets are forwarded from the sensors through the network to the sink. More specifically, for every node, its forwarding policy specifies the proportion of packets that should be forwarded on each outgoing link toward the sink. Hou et al. [15], [16] define the problem of maximizing a sensor network s lifetime as to find the packet forwarding policies for all nodes that collectively produce the lexicographically largest lifetime vector, called the maximum lifetime vector. In less precise terms, it first maximizes the smallest lifetime of all nodes, then maximizes the second smallest lifetime of all nodes, andsoon.houet al. show that this problem can be modeled as a series of linear programming (LP) problems. After solving the LP problems, the sink uploads the optimal packet forwarding policies to the sensors. Based on its forwarding policy, each sensor forward its packets. Such a solution is, however, a centralized one. It requires solving LP problems of size,where is the number of sensors in the network, is the number of links, and LP has high-order polynomial complexity. The computation overhead can be prohibitively high for large sensor networks that need to be operational soon after deployment. Collecting the complete information about the network and uploading the complete forwarding policies to all nodes require significant amount of transmissions in the network, particularly for nodes around the sink. To avoid these problems, a distributed algorithm that spreads the overhead evenly on all nodes becomes important. This paper presents the first distributed solution for the problem of maximizing the lifetime vector of a sensor network IEEE

2 1188 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 21, NO. 4, AUGUST 2013 Our strategy is to design a distributed progressive algorithm that works in a series of iterations. Each iteration produces a lifetime vector that is better than the lifetime vector from the previous iteration. The sequence of lifetime vectors produced from the iterations approaches to the optimal solution. A distributed progressive algorithm is practically attractive because a result is available at any time and is getting better as more time is spent. We show that when the algorithm stabilizes, its result produces the maximum lifetime vector. We have performed thousands of simulation runs on random networks of various sizesandcomparedthemtohou scentralized algorithm as well as other related algorithms. The results demonstrate that our algorithm rapidly converges to the maximum lifetime vector and its overhead is small. Fornetworksofthousandsof nodes, it produces near-optimal results in iterations one iteration requires each node to transmit two small control messages. The algorithm scales well as its overhead increases slowly with respect to network size. When used as a centralized algorithm, it is two to three orders of magnitude faster than Hou s linear programming solution for random networks of thousands of nodes; the performance gap increases for larger networks. We also compare the proposed algorithm with other existing algorithms that maximize the smallest sensor lifetime in the network or perform minimum-power routing. The proposed algorithm produces much better lifetime vector. The rest of this paper is organized as follows. Section II gives the network model and the problem statement. Section III lays down the theoretical foundation for our algorithm. Section IV proposes our distributed progressive algorithm for maximizing the lifetime vector. Section V gives a few illustrative examples. Section VI presents the simulation results. Section VII draws the conclusion. II. NETWORK MODEL AND PROBLEM DEFINITION A. Sensor Network Model Let be the set of sensor nodes, among which a subset of nodes that are located in places of interest will generate data. They are called data sources. Other nodes in help to forward packets from data sources to the sink although they do not have to generate data themselves. Note that data sources will also forward packets from others if they are on the routing paths to the sink. Let,bethesource rate at which node generates new data packets. if ; if.weassume that the source rates are set low enough to not cause congestion in the network. The sink may consist of multiple geographically dispersed base stations. We assume the base stations are connected to a data server. It makes no difference to which base station a data packet is routed. Two nodes are neighbors if they can receive packets from each other (to support DATA/ACK exchange). There may be multiple routing paths from each node to the sink. Let be the set of neighbors that node use as the next hops to the sink. They are called downstream neighbors of node., is called an outgoing link of.let be the set of upstream neighbors, whichuse as the next hop on their routing paths to the sink., is called an incoming link of.if is a downstream neighbor of,then must be an upstream neighbor of.let. We call Fig. 1. (a) Meshy routing graph (b) Single-path routing (c) All-paths routing. the graph consisting of all these links as the routing graph of the sensor network, which contains all routing paths from data sources to the sink. The routing paths should be acyclic. Any suitable routing protocol may be used to generate the routing paths. For example, if geographical routing [17] [20] is used, may consist of all or a selected subset of neighbors that are closer to the sink (based on Euclidean distance to the closest base station), and may consist of all or a selected subset of neighbors that are further away from the sink. Numerous localization methods have been proposed to establish geographic locations among sensors; relative locations [21] or virtual locations [19] may also be used. Another alternative approach is to use hop counts, where may consist of all or a selected subset of neighbors that arecloserto(fartherawayfrom) the sink based on hop count. The hop counts from nodes to a sink can be learned from a distance-vector protocol or through a broadcast from the sink, in which the broadcast message carries a counter that is increased by one after each hop and, upon the first receipt of the message, each node takes the counter value of the message and forwards the message to neighbors except for the one from which it receives the message. An example is given in Fig. 1(a), where and are data sources, and are nonsource nodes, and BS stands for a base station. Using geographical routing, we have,,,, and so on. There are two routing paths from to BS: BS, and BS. Similarly, there are two routing paths from to BS. In a large, complex network, there may be numerous different paths from each data source to the sink. Since sensors around the sink have to forward others data, they are likely to exhaust their energy first and prevent the rest of the network from reaching the sink. The proposed algorithm in this paper deals with how to make the best use of available energy. It cannot make a physical energy bottleneck going away. To address this issue, we have to increase the energy availability around the sink by deploying more sensors there, using larger batteries, or perform in-network data aggregation to reduce the amount of traffic going through those nodes. B. Lifetime, Volume, and Lifetime Vector For an arbitrary data source,wedefine its lifetime to be the period from the time it begins generating data to the time when it runs out of energy or its packet can no longer reach the sink. The latter case happens when is partitioned from the sink because other nodes on its routing paths run out of energy. We define the source volume of a node to be the total number of data packets that are generated by and delivered to the sink in its lifetime. Obviously, if,

3 ZHANG et al.: MAXIMIZING LIFETIME VECTOR IN WIRELESS SENSOR NETWORKS 1189 and it is zero otherwise. The lifetime of a data source volume are connected by the following formula: and its (1) larger than what s achieved in Fig. 1(b). The problem is how we determine the number of packets transmitted over each link so that the maximum lifetime vector can be achieved in a complex network. For example, in Fig. 1(a), suppose produces a new data packet per minute, i.e., If the energy at allows it to produce 50 K packets and the energy at nodes on its routing paths can deliver all these packets to BS, then is 50 K min. When data sources share routing paths, their volumes (i.e., lifetimes) are dependent on each other. If we deliver more packets for one data source (so that it has a larger volume and can operate longer), another competing source may have to suffer. Each data source has its own lifetime. If we put the lifetimes of all sources in a vector and sort them in ascending order, we have the lifetime vector of the sensor network. As we will demonstrate through an example shortly, different ways of forwarding packets in the network will result in different lifetime vectors. Our goal is to find the optimal way of forwarding packets in order to achieve the lexigraphically maximum lifetime vector, which is defined as follows. Consider two feasible lifetime vectors, and, respectively, where and,,.wesay if,,and if, and. Let be the set of all feasible lifetime vectors that can possibly be achieved in a sensor network. The maximum lifetime vector is the largest in :. Our goal is to design a distributed algorithm to achieve the maximum lifetime vector. Intuitively, it is to first maximize the smallest lifetime among all sources, then maximize the second smallest, and so on. C. Decoupling Routing If we choose a single routing path for each data source, we will have a path selection problem. In Fig. 1(b), suppose and are energy bottlenecks in the network, and they have enough energy to forward 50 K packets and 100 K packets, respectively. If packet per minute, the lifetime of is 50 K min, and that of is 100 K min, using the routing paths shown by bold arrows in Fig. 1(b). The lifetime vector is thus. There is a serious problem: Once the optimal routing path for a source is determined, this information has to be sent to all nodes on the path so that they can create a routing entry for packets from that source. However, the scheme requires per-source routing entries, which may not be acceptable for memory-constrained sensors. To address the above problem, we decouple routing from lifetime maximization. The lifetime maximization algorithm should be able to work with any underlying routing protocol. For example, if geographic routing is used, nodes simply forward packets to neighbors that are closer to the sink. No routing entries are needed. There may exist numerous paths from a source to the sink. Packets from the source should be able to use all these paths in order to fully explore the opportunities of lifetime maximization. An example is shown in Fig. 1(c), where we label each link with the number of packets sent over the link. Source sends 50 K packets through to the sink, and 25 K more through. The resulting lifetime vector is, D. Volume Schedule The volume of a link is defined as the number of packets transmitted on the link over the lifetime of the sensor network. All link volumes and source volumes together form a volume schedule. There are many possible volume schedules, but not all of them can be actually realized. A volume schedule is feasible only if it satisfies the following energy and volume conservation constraints. Let be the energy available at node.let be the amount of energy that a node spends on receiving a data packet from an upstream neighbor, be the amount of energy that node spends on producing a new data packet, and be the amount of energy that node spends on sending a packet. The energy constraint is given as follows: We say a node is exhausted if That is, its energy will be used up after all packets are delivered in the network according to the volume schedule. The volume conservation constraint depends on the application model. If each node simply forwards all packets that it receives from upstream neighbors, then the number of packets sent out by a node will be equal to the number of packets it receives plus the number of packets that it generates locally, i.e., For periodic min/max/avg measurement among readings from data sources, each node will aggregate information from packets received from its upstream neighbors and then send out a single packet downstream. For example, suppose the application is to find out the minimum reading of all sensors. As the readings are sent from sensors toward the sink, each node will perform aggregation by finding the smallest value among its local reading and the readings received from upstream neighbors. It will only send this smallest value downstream E. Packet Forwarding Based on Volume Schedule Thevolumeschedulespecifies the number of packets from each source that can be delivered to the sink. According to (1), this determines the lifetimes of all sources, i.e., the lifetime vector. Moreover, the volume schedule also specifies how many of these packets are delivered on each link. This information tells how to forward packets through the network to reach the (2) (3) (4)

4 1190 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 21, NO. 4, AUGUST 2013 sink, and thus gives an implementation of the lifetime vector. To implement a volume schedule, each node simply does the following: 1) It generates new packets at its source rate for packets, and 2) it forwards the received packets to downstream neighbors in weighted round robin, using the volumes on the outgoing links as the weights. Therefore, the packet rates on the outgoing links are proportional to the volumes on the links. This is called the volume-rate property (5) where is the packet rate on link. Our goal is to design a full distributed algorithm that finds a feasible volume schedule to produce the maximum lifetime vector. Once we find the volume schedule for the maximum lifetime vector, the nodes know how to forward their received packets based on the volumes of their adjacent links. F. Additional Definitions We give additional definitions that are needed by the proof of a theorem in Section III. The volume of a (directed) path is defined as the minimum volume of the links on the path. A path in the routing graph is called a forwarding path if its volume is greater than zero. Otherwise, it is called a nonforwarding path. Node is a feeding source of node if there is a forwarding path from to.furthermore,node is a restricted feeding source of node if there is an exhausted node on every forwarding path from to.node is an unrestricted feeding source of node if there is no exhausted node on at least one forwarding path from to,wherethepath referred in this definition includes but excludes.node is a potential source of node if it is not a feeding source of, but there exists a nonforwardingpathfrom to, and the path has no exhausted node. III. NECESSARY AND SUFFICIENT CONDITIONS FOR MAXIMIZING LIFETIME VECTOR This section establishes the necessary and sufficient conditions for maximizing the lifetime vector in a theorem. We explain a basic technique used in the proof, called volume shift, which increases the lifetime (or volume) of a data source at the expense of another. In Fig. 2, consider a feasible volume schedule where nodes and are two unrestricted feeding sources of node. Suppose the volume of is larger than the volume of.let and be two forwarding paths that do not have any exhausted node. We show that the lifetime of an unrestricted feeding source can be increased at the expense of the lifetime of another. To do so, we simply let send more packets down the path and let send less down the path, such that their combined number of packets to node stays the same. More specifically, we decrease the source volume of by a certain amount and decrease the volumes on the links of accordingly. We then increase the source volume of by the same amount and increase the volumes on the links of accordingly. The amount of change should be small enough such that its addition on does not violate the energy constraint. The above operation is called a volume shift from to with respect to.aftervolume shift, the volume schedule remains feasible and the lifetime of is decreased, the lifetime of is increased, while the lifetimes of all other sources remain unchanged. Obviously, in order to Fig. 2. There is no exhausted node on or ; nodes and are unrestricted feeding sources of. There is an exhausted node on ; node is a restricted feeding source of. There is no forwarding path from to ; node is a potential source of. improve the lifetime vector, we shall always perform a volume shift from a node with a larger lifetime to a node with a smaller lifetime. Not only can a volume shift be performed between two unrestricted feeding sources, but also it can be performed from a restricted feeding source to an unrestricted feeding source, or from an unrestricted feeding source to a potential source, but not the other way around more specifically: 1) Avolume shift cannot be performed from an unrestricted feeding source toarestrictedfeedingsource because we cannot add any additional volume to that has an exhausted node ;2)avolume shift cannot be performed from a potential source to an unrestricted feed source because the volume of any path from to is zero, and thus nothing can be shifted out. Theorem 1: A feasible volume schedule produces the maximum lifetime vector if and only if the following conditions are met. 1) There is an exhausted node on every path from any source to the sink. 2) All unrestricted feeding sources of a node must have the same lifetime, which should be no less than the lifetimes of the restricted feeding sources of the same node, and no greater than the lifetimes of the potential sources of the same node. Proof: First, we prove that the conditions are necessary. If a feasible volume schedule does not meet either condition, we show that a larger lifetime vector can be produced by modifying the volume schedule. If the first condition is not true on a path from a source to the sink, we can improve the lifetime of by increasing its source volume as well as the volume of by a tiny amount, which results in a larger lifetime vector. Next, consider the second condition. If an unrestricted feeding source has a greater lifetime than another unrestricted feeding source of a node, we can perform a volume shift (Fig. 2) from to such that the lifetime of is slightly increased (but still below that of ), whichresultsinalargerlifetimevector.notethatthevolume shiftonlychangesthelifetimesoftwonodes, and. If an unrestricted feeding source has a smaller lifetime than a restricted feeding source, we can perform a volume shift from to to increase the lifetime vector. Ifanunrestrictedfeedingsource has a greater lifetime than a potential source, we can perform a volume shift from to to increase the lifetime vector. Second, we prove that the conditions are sufficient. The lifetime space, consisting of all feasible lifetime vectors, is convex and compact, which can be easily seen from the linear (or max) nature of the energy constraint (2) and the volume conservation constraint (3) or (4), as well as the lifetime definition (1).

5 ZHANG et al.: MAXIMIZING LIFETIME VECTOR IN WIRELESS SENSOR NETWORKS 1191 Radunovic and Le Boudec showed that a max-min vector always exists in a convex, compact space. Moreover, it is unique and must be lexicographically largest in the space [22]. Hence, we only need to show that a feasible volume schedule that meets the two conditions produces the max-min vector, satisfying the following requirement: The lifetime of one source cannot be increased without decreasing lifetime of another source, for which. We can show that the above requirement is indeed satisfied based on the following facts: The lifetime of any source is determined by its source volume; these two quantities are proportional to each other. Due to the first condition, each path from to the sink has an exhausted node, so that its lifetime (i.e., source volume) cannot be increased without decreasing the lifetime (source volume) of another node, which must be a feeding source because a potential source does not send any competing packets and thus has no volume to decrease. Due to the second condition, the lifetimes of other feeding sources are not greater than the lifetime of. If we increase the lifetime (source volume) of, at least one of those nodes has to pay, by lowering its lifetime (source volume). The above theorem gives us some guideline for designing a distributed algorithm that generates a volume schedule to maximize the lifetime vector. Based on the first condition, data sources should aggressively set their source volumes to the highest values that their paths to the sink allow. According to (1), the lifetime of a source is equal to its volume divided by its rate. For unrestrictive feeding sources of a node, the second condition requires their volumes to be allocated in proportional to their rates, so that they will have the same lifetimes. IV. DISTRIBUTED PROGRESSIVE ALGORITHM After the sink is deployed, before the sources actually generate data packets and deliver them to the sink, a distributed progressive algorithm (DPA) is executed to produce a volume schedule, based on which the data packets will be forwarded. A. Rate Schedule, Volume-Bound Distribution, Volume Schedule DPA iteratively refines a volume schedule,. To accomplish this task, we need to introduce a couple of auxiliary concepts. A rate schedule,,isdefined by assigning a rate value to each link in the routing graph. A volume-bound distribution,,isdefined by assigning a volume bound to each link and each node, where volume bound specifies the maximum volume that is allowed on link and source volume bound specifies the maximum volume that is allowed to be generated from a node.oneofthe key operations of DPA is to compute volume bounds. Volume bounds are constrained by the energy at the nodes. Essentially, we will convert energy constraints into volume bounds before the volumes are set. DPAbeginswithaninitialrateschedule that can be arbitrarily set. From the rate schedule and energy availability at the nodes, it computes a volume-bound distribution based on the second condition in Theorem 1. From the volume-bound distribution, it sets a volume schedule, based on which it will in turn derive a new rate schedule. This completes the first iteration of the algorithm. As shown in Fig. 3, in each subsequent iteration, DPA Fig. 3. Iterations of DPA. repeats the above computation of a new volume-bound distribution (based on the rate schedule from the previous iteration), then a new volume schedule, and finally a new rate schedule. Each iteration produces a better volume schedule whose lifetime vector is larger than the previous one. The rate schedule, volume-bound distribution, and volume schedule are stored and computed in a fully-distributed way. Each node only maintains the rates, volume bounds, and volumes of its adjacent links with a space complexity of. Because each directed link is shared by a pair of upstream-downstream nodes. Some properties of the link will be set by the upstream node and then sent to the downstream node, while other properties will be set by the downstream node and then sent to the upstream node. Details are given as follows. Node will set its outgoing rates,,bydistributing the total incoming rate among the outgoing links. It will learn the incoming rates,, from upstream neighbors who set those rates. (We want to stress that the link rates here are auxiliary variables used to facilitate the computation of volumes. They have nothing to do with the actual data-packet rates on the links at the time when DPA is executed. In fact, DPA can be executed at the beginning of the deployment before any data packets are transmitted.) Node will set its outgoing volumes by distributing the total incoming volume among the outgoing links. It will learn the incoming volumes from upstream neighbors who set those volumes. Node will set its incoming volume bounds by distributing its forwarding capacity among the incoming links. It will learn the outgoing volume bounds from downstream neighbors who set those bounds. In the rest of the section, we will describe the details of DPA, which consists of initialization phase and iterative phase with each iteration having two steps. The first step computes volume bounds based on link rates. The second step determines link volumes from volume bounds and then computes new links rates, which sets the stage for the next iteration. B. Initialization Phase This phase arbitrarily sets up a rate schedule. The distributed computation for initializing link rates is described as follows. The sink broadcasts an INIT packet backward in the routing graph. When a node receives INIT, it forwards the packet to its upstream neighbors. If has no upstream neighbor (i.e., is a leaf in the routing graph), it distributes its source rate evenly among its outgoing links, i.e.,, where is the assignment operator. Node then sends those outgoing rates to its downstream neighbors in a RATE packet. After a node learns in RATE packets from all upstream neighbors,itfirst computes its outgoing rates as

6 1192 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 21, NO. 4, AUGUST 2013, and then sends those rates to downstream neighbors in a RATE packet. The initialization phase terminates when the sink receives RATEs from all neighbors. Intuitively, this phase begins with a wave of INITs traveling backward in the routing graph to all nodes, and the INIT packets are turned around at leaf nodes to form a reverse wave of RATEs that assign the initial rates of all links subject to the flow conservation constraint. In total, at most INIT packets and RATE packets are transmitted. Each node sends one INIT of size and one RATE packet of size. The initialization phase completes within the maximum round trip time between the sink and any source in the network. C. Iterative Phase Step 1: From Rates to Volume Bounds The first step of each iteration is to set volume bounds based on link rates. Each node must appropriately set its incoming volume bounds,, and the source volume bound,, such that it does not receive more packets than it is able to forward. We describe two volume-capacity constraints that the volume bounds must satisfy, and then present the distributed algorithm that sets all volume bounds. First,anode should not receive and forward more packets than the downstream neighbors can handle. If the application model is characterized by (3), then the combined incoming volume bound (set by ) should not exceed the combined outgoing volume bound (set by downstream neighbors) where is learned by from. If the application model is characterized by (4), then the constraint becomes Second, node should not receive and forward more packets than its energy allows (6) (7) (8) The distributed computation of Step 1 is described as follows. The sink begins the process of setting volume bounds after the rate initialization phase terminates (at the time when the sink receives RATEs from all upstream neighbors), or after Step 2 completes (at the time when the sink receives VOL_RATE packets from all upstream neighbors to be described in Section IV-D). The sink sets its incoming volume bounds to be infinite and sends a BOUND packets to upstream neighbors, carrying the volume bounds of its incoming links. After a node receives BOUNDs from all downstream neighbors and learns all outgoing volume bounds, it sets the incoming volume bounds,, and its source volume bound as large as possible, based on (9) subject to the constraints of (6) (8). Node then sends its incoming volume bounds tothe upstream neighbors in a BOUND packet. In total, BOUND packets are transmitted. Each node only transmits one packet of size. D. Iterative Phase Step 2: From Volume Bounds to Volumes and Rates Next we discuss how to set the volumes of all links based on the volume bounds from Step 1. We first discuss how the volumes should be assigned, and then present the distributed algorithm to do so. Each node should set the outgoing volumes,, and its source volume, subject to the following bound constraint: (10) The first condition of Theorem 1 requires us to set the source volume as high as possible. Hence, we should assign (11) In addition to (10), outgoing link volumes are also subject to the volume conservation constraint in (3) or (4). A node cannot send more packets than it receives. If it does not receive enough incoming volumes, its outgoing volumes may have to be set lower than what the volume bounds allow. If the volume conservation constraint is (3), to satisfy this constraint, node assigns its outgoing volumes as follows: where for application model (3) (12) where is set by upstream neighbor and learned by from. If the volume conservation constraint is (4), node assigns the outgoing volumes to be for application model (4). As we have explained in Section III, the second condition of Theorem 1 requires that volume allocation should be made in proportion to the incoming rates (which must be adjusted for restricted feeding sources, as will be discussed shortly in Step 2). Hence, we have the following rate-bound property: (13) First, we prove by induction that using (12) will satisfy the bound constraint (10). Consider the base case with.by (12), (6), and the fact that,wehave (9) If,then.If,then.

7 ZHANG et al.: MAXIMIZING LIFETIME VECTOR IN WIRELESS SENSOR NETWORKS 1193 Fig. 4. There is no exhausted node from to ; node is an unrestricted feeding sources of. There is an exhausted node from to ; node is a restricted feeding source of. The upstream bottleneck may prevent source from fully utilizing the volume bound set by on link. allow to have a larger source volume and thus a larger lifetime. Since volume bounds are set at Step 1 based on link rates, we can achieve the reduction of by artificially reducing the rate. More specifically, after the link rates are calculated based on (14) and (15), they may be reduced by multiplying a reduction factor, which has an initial value of 1 and is updated at each iteration as follows. Suppose node is not a direct neighbor of the sink. If is exhausted, i.e.,, or it was exhausted in one of the previous iterations, then it updates Next, we make the inductive assumption that, and prove the case when. (This is a valid inductive assumption for a DAG routing graph, which has no loop for circular reasoning.) Together with (6) and (11), we have (16) By similar induction proof, it can be shown that using (13) will also satisfy the bound constraint (10). This result, together with (8), ensures that the assigned volumes satisfy the energy constraint required in (2) to see this, one has to use the fact that due to (12) and (13) and (10), where is defined in (8). Consequently, the resulting volume schedule is feasible. After we set the link volumes, we assign new link rates based on the rate-volume property in (5), setting the stage for the next iteration. For application model (3) For application model (4) (14) (15) We have one additional issue that must be handled. As shown in Fig. 4, the volume bound assigned by on link for an unrestricted feeding source will be fully utilized. However, the volume bound assigned by on link for a restricted source may not be fully utilized due to an upstream bottleneck that may set a tighter bound on the source volume of.inthis case, the volume,whichissetby and constrained by the limited upstream energy at, is smaller than the volume bound. When this happens, we shall reduce to match, and allow to be larger, which will in turn where and are the would-be volume bound and volume on all outgoing links, respectively, if the rate reduction had not been preformed to reduce the outgoing volume bound in previous iterations. Clearly, the value of will stabilize at an exhausted node only when the volume matches the bound. After updating,node reduces the outgoing rates as follows: (17) For the example in Fig. 4, both and will perform the above operation. When does so, its rate reduction will propagate downstream, causing the reduction of,whichinturn causes the reduction of and the increase of. The distributed computation of Step 2 for setting volumes/ rates is a natural continuation of Step 1. After a node with no upstream neighbor receives BOUND (defined Step 1) from all downstream neighbors, it is able to assign its source volume by (11) and outgoing volumes by (12) and (13). It then updates the link rates by (14) (17). After that, it sends the outgoing volumes/rates to the downstream neighbors by a VOL_RATE packet. After a node receives VOL_RATE packets from all upstream neighbors and learns,itisabletoassignits source volume by (11), the outgoing volumes by (12) and (13), and the new outgoing rates by (14) (17). It sends the outgoing volumes/rates to downstream neighbors in VOL_RATE. When the sink receives VOL_RATE from all upstream neighbors, it knows that Step 2 is completed. Step 2 transmits packets. Each node sends only one packet of size. Each iteration, including Steps 1 and 2, completes within the maximum round trip time between the sink and any source in the network. E. Property DPA carries out three computations to set volume bounds, volumes, and rates, respectively. We show that all three computations lead to better lifetime vectors.

8 1194 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 21, NO. 4, AUGUST 2013 First, consider the computation of volume bounds. The total forwarding capability of a node, which is determined by (6) (8), is distributed as volume bounds based on the rate-bound property in (9), which essentially performs volume shift from feeding sources with larger lifetime (i.e., volume divided by rate) to those with smaller lifetime. Such volume shift increases the lifetime vector. The only problem is that a volume bound may not be fully turned into volume if there is an upstream exhausted node that sets a tighter volume bound. This problem is solved by rate reduction, which contiguously updates a reduction factor by (16) until the volume matches the bound. Second, the volume assignments in (10), (12), and (13) are aggressive in the sense that they try to fully utilize all volume bounds, by setting the source volumes as high as possible and by forwarding all incoming volumes at each node. Third, the rate reduction in (14) (17) artificially decreases the link rates if the volume bounds are not fully turned intothe volumes. In subsequent iterations, due to (9), decreased rates lead to decreased volume bounds on those links, allowing other links that can fully utilize their bounds to have higher volume bounds. In summary, the volume bound computation performs volume shift from large-lifetime sources to small-lifetime sources; the volume computation and the rate reduction technique ensure that the volume bounds are fully utilized. Together, they improve the lifetime vector as DPA executes through its iterations. As the lifetime vector moves increasingly closer to its maximum value, the room for improvement becomes smaller and smaller. Our simulations will show that DPA converges rapidly. Theorem 2: When DPA stabilizes the link volumes, the resulting volume schedule produces the maximum lifetime vector. Proof: Let be the subgraph consisting of all paths from sources to the first encountered exhausted nodes or to the sink if no exhausted nodes are encountered. Rate reduction has no impact on the link rates inside. When link volumes are stabilized in, link rates and volume bounds must also be stabilized because their linear interdependency in (5), (9), and (12) (15). We prove by induction that (18) Consider the base case with. Node is not exhausted and hence By (11) (13), it can be rewritten as where is defined in (8). Therefore, the real constraint for the value of is (6) and (7). Since we should set s value as large as possible, we have By (12) and (13), we have.next,wemake inductive assumption that, and prove the case when. (This is a valid inductive assumption for a DAG routing graph, which has no loop for circular reasoning.) The proof is similar to the base case, except that and are included in the formulas. To prove that the resulting volume schedule achieves the maximum lifetime vector, we have to show that the two conditions in Theorem 1 are satisfied. First, we prove by contradiction that the first condition holds. If not, the sink will be in. Consider an arbitrary link. We have proved earlier that,whichis not possible because is infinity. Second, we prove that the second condition of Theorem 1 holds. Let and be two unrestricted feeding sources of node. Let be a path from to that has no exhausted node. Let be a path from to that has no exhausted node. Both and are in. Hence, for each link on the paths, its volume is equal to its volume bound. By (3) (5), (9), (14), (15), and (18), the ratio of volume to rate is kept constant over the links of and equal to, the lifetime of. Similarly, the ratio of volume to rate is kept constant over the links of and equal to,the lifetime of. Moreover, these two ratios have to be the same when and intersect at due to (9) and (18). By assigning link rates in proportion to link volumes, (14) and (15) attempt to equalize the links volume-to-rate ratios, which means, after each iteration, the rate is shifted away from downstream links with smaller volume-to-rate ratios to links with larger volume-to-rate ratios. The construction of the initial rate schedule ensures that every routing path is a forwarding path and there is no potential feeding source at the beginning. An unrestricted feeding source may become a potential feeding source by shifting its rate away from a path. When an unrestricted feeding source of has a larger lifetime than other unrestricted feeding sources of (due to routing paths that are not through ), the node s downstream link toward will have smaller volume-to-rate ratio than its other links. Only in this case, due to (14) (15), its rate will be contiguously shifted away from feeding, and eventually turns itself into a potential source of. We have proved earlier the first condition of Theorem 1 that there is an exhausted node on every path from a source to the sink. Let be the subgraph consisting of all paths from sources to the last encountered exhausted nodes, and be the set of those last encountered exhausted nodes, which forms a cut of the network that separates the sink from all sources. When link volumes are stabilized in, link rates and volume bounds must also be stabilized because their linear interdependency in (5), (9), and (12) (15). We prove by contradiction that (19) Suppose,,. Based on the definition of, any path from to the sink must contain an exhausted node. By (8), (10), (12), (13), and the above assumption, we have In addition, from (3), (4), (6), and (7), we have:,. Following the same token, we know that must not be exhausted, and it also has a downstream link whose volume is smaller than bound. Repeating the above reasoning, we can construct a path all the way to the sink without passing

9 ZHANG et al.: MAXIMIZING LIFETIME VECTOR IN WIRELESS SENSOR NETWORKS 1195 an exhausted node, which contradicts with the fact that any path from to the sink must contain an exhausted node. By (3) (5), (9), (14), (15), and (19), the ratio of volume to rate is kept constant on any path segment in that does not contain an exhausted node (which performs rate reduction). It is easy to see that the lifetime of a restricted feeding source of a node can only be equal to or smaller than that of an unrestricted source because, due to rate reduction, the radio of volume to rate will decrease when we traverse a path backward from to and cross an exhausted node. F. Termination Conditions By Theorem 2, we shall terminate DPA when it has stabilized the link volumes, which can be detected by adding a flag that is transitively carried by the control messages. The flag is initially unset. A node sets the flag if it changes a link volume by an amount that is not negligibly small. It is up to the application requirement to decide on how small is negligible. The sink will stop if it does not receive a flag that is set. Alternatively, DPA may also be terminated artificially after a certain number of iterations, or when the resulting lifetime vector meets the application requirement. G. Overhead DPA has a flooding-based design. Flooding would be considered as inefficient for point-to-point tasks such as routing a packet from a source to a destination. However, for a global task such as building a volume schedule that involves every node and every link, flooding is the obvious choice that allows every node to participate in the distributed computation. While the flooding design itself may appear noninnovative, the novelty of DPA is in the details that establishes the constraints and formulas for nodes to perform localized operations iteratively computing their individual volume bounds from rates, volumes from volumes bounds, and rates from volumes with reduction yet globally, as a net outcome, produce a progressively better lifetime vector, approaching to the optimal result. During each iteration, node sends two control packets, one BOUND of size and one VOL_RATE of size. Upstream/downstream neighbors represent a subset of all nodes within the communication range of. The packet size is limited when we choose a small number of upstream/downstream neighbors for routing purpose. We performed many simulations in Section VI, which shows that DPA converges quickly toward the optimal lifetime vector. To achieve no more than 5% deviation from the optimal, for networks of 1000 nodes, less than 25 iterations are needed. In addition, the overhead (i.e., number of iterations) increases slowly with network size. If the network is designed to collect tens of thousands of data packets from each source, the small overhead of DPA (in tens of control packets per node) is negligible. If the number of iterations is predetermined, we can take the small energy consumption of DPA into account by reducing the nodes energy for an appropriate amount. H. Centralized or Distributed DPA can be trivially turned into a centralized one that is implemented at the sink if it has the complete information about the network. Comparing with the existing approach [15], [16] of Fig. 5. Progressively improving lifetime vector. (Volume and volume bound are in thousands.) (a) Rate. (b) Volume bound. (c) Volume. (d) Rate. (e) Volume bound. (f) Volume. (g) Volume after fifth iteration. (h) Volume after 10th iteration. (i) Volume for max lifetime vector. solving linear programs (each having high-order complexity), this centralized algorithm is remarkably efficient as it only needs to run for a small number of iterations (each having linear complexity ) to get close-to-optimal results. However, we believe a distributed implementation is more relevant to sensor network deployment in general when the complete information of the network is not readily available. I. Topology Change During network operation, unexpected node failures may change the topology of routing graph and reduce the lifetimes of affected sources. When node failure is detected, DPA may be reexecuted to produce an updated volume schedule. However, if small topology changes are frequent, invoking DPA frequently may cause considerable overhead. One way to reduce overhead is to perform DPA periodically or upon triggering after a certain number of node failures are detected. We will evaluate the impact of small topology changes on lifetime vector by simulation. V. EXAMPLES This section gives a few examples to illustrate how DPA works. A. Iterations of DPA In Fig. 5, data sources and generate new data at the same rate of one packet per minute. Suppose and are energy bottlenecks in the network. Each of them is able to forward packets before its energy is exhausted. This maximum number of packets that a node is able to forward is called the volume capacity. Assume the energy available to sources and is plentiful. The top two rows of plots in the figure show the rate schedule, the volume-bound distribution, and the volume schedule after

10 1196 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 21, NO. 4, AUGUST 2013 the first two iterations of the algorithm, respectively, while the third row presents only the volume schedules after the fifth and 10th iterations, as well as the optimal volume schedule that produces the maximum lifetime vector. We now examine the first iteration of the algorithm. In Fig. 5(a), DPA begins with an initial rate schedule, where each node splits its rate (received from upstream or locally generated) evenly among its outgoing links. For example, and. The source rate is shown in the parentheses beside the source node. In Fig. 5(b), the volume capacity of a node is shown in the parentheses beside the node. It is determined either by the local energy if the node itself is a bottleneck (in the case of or ), or by downstream energy bottleneck (in the case of or ). A node should set the volume bounds on its incoming links in such a way that their sum is equal to the node s volume capacity and their values are proportional to the link rates. Because the ratio of and is 1:2, node splits its volume capacity in the same ratio, 3.3 thousand packets for link and 6.7 thousand packets for link. The volume capacity of is the sum of the volume bounds on its outgoing links, which is 13.3 thousand packets. Node sets its source volume to 13.3 thousands, as shown in the parentheses beside the node in Fig. 5(c). Then, it sets the volumes on the outgoing links to be the same as the volume bounds. Because the source rates of and are both 1, their lifetimes are equal to their source volumes in this example. Next we examine the second iteration of the algorithm. Based on the volume-rate property in (5), from the volume schedule in Fig. 5(c), we can derive the new rate schedule in Fig. 5(d) for the next iteration. Note that is changed from 0.5 in the previous iteration to It means that has directed some of its traffic awayfrom to in an effort to equalize its lifetime with. From the new rate schedule, the algorithm calculates the volume-bound distribution in Fig. 5(e) and then derives the volume schedule in (f). It is evident that a volume shift from to with respect to has happened when compared to the previous volume schedule. It results in a lifetime vector (8,12) larger than the previous one (6.7, 13.3). The volume schedules after the fifth and the 10th iterations are shown in Fig. 5(g) and (h), respectively. Their lifetime vectors are (9.09, 11.01) and (9.57, 10.43), respectively, approaching to the maximum lifetime vector (10, 10), which is showninfig.5(i). B. Rate Reduction Next, we show an example with a restricted feeding source in Fig. 6, where a new node, whose limited energy allows it to forward only 5000 packets, is inserted between and. The first iteration of the algorithm is illustrated by the top row of plots in the figure. Let us take a close look at Fig. 6(b). Node s volume capacity is divided between and in proportion to the link rates. Hence, the volume bound is 6.7 thousand packets. However, node cannot fully utilize this volume bound because its energy can only forward 5 thousand packets. Consequently, the volume bound is only 5000 packets, and the source volume of is also limited to 5000, as shown in Fig. 6(c). The volume bound on is not fully utilized. Solving this problem requires rate reduction. Fig. 6. Problem caused by restricted feeding sources. (Volume and volume bound are in thousands.) (a) Rate. (b) Volume bound. (c) Volume. (d) Rate. (e) Volume bound. (f) Volume. To illustrate the necessity of rate reduction (described in Section IV-D), we first demonstrate what will happen without it. The second iteration of the algorithm is illustrated by the next row of plots. In Fig. 6(d), directs some of its trafficaway from link, as we have explained in the previous example. Shown in Fig. 6(e), this results in a larger volume bound for link, which is now 8000, compared to 6.7 thousand in the previous iteration. However, the volume bound for link remains 5000 due to the bottleneck. Hence, the source volume of is still limited to 5000 in Fig. 6(f). The new lifetime vector (5.0, 12.0) is smaller than the previous one (5.0, 13.3). If we continue this example, we will see that the lifetime vector will become smaller after each iteration. The cause of the problem is that is a restricted feeding source of, with an exhausted node on its forwarding path, which prevents it from fully utilizing the volume bound assigned on link by node. To solve this problem, node should reduce the volume bound on and increase the volume bound on such that the unrestricted feeding source can have a larger lifetime. We use Fig. 7 to explain the solution of rate reduction. We know that the volume bounds should be set in proportion to the link rates. In order to reduce the volume bound, we can artificially reduce the link rate. More specifically, each exhausted node maintains a new variable, called the rate-reduction factor. The exact formula for calculating the value of is given in Section IV-D. In this simple example, when we see the volume bound is 6.7 thousand in Fig. 7(b) and the volume is 5000 in Fig. 7(c), we want to reduce the volume bound by a factor of so that the two will match. To achieve that, we set the value of to,andartificially reduce the link rate by multiplying it with. The result is shown in Fig. 7(d), where is reduced to, which leads to a reduced volume bound in Fig. 7(e), now 7.5 thousand instead of 8000, and an increased volume bound, now 2.5 thousand instead of 2 thousand. This allows the lifetime of to be 12.5 in Fig. 7(f), instead of 12 in Fig. 6(f), where the rate reduction on link was not performed. With rate reduction, after the fifth, 10th, and 12th iterations, the lifetime of source is improved to 14.94, 14.97, and 15.0,

11 ZHANG et al.: MAXIMIZING LIFETIME VECTOR IN WIRELESS SENSOR NETWORKS 1197 Fig. 8. Simple illustrative test case. TABLE I DATA SOURCE LIFETIMES (IN DAYS) Fig. 7. Rate reduction. (Volume and volume bound are in thousands.) (a) Rate. (b) Volume bound. (c) Volume. (d) Rate. (e) Volume bound. (f) Volume. (g) Volume after fifth iteration. (h) Volume after 10th iteration. (i) Volume after 12th iteration. TABLE II DATA SOURCE VOLUMES (IN THOUSANDS OF PACKETS) respectively, as shown in Fig. 7(g) (i), practically achieving the maximum lifetime vector (5.0, 15.0). VI. SIMULATION In this section, we develop a simulation software to evaluate the performance of DPA. We want to point out that the proposed algorithm is designed to run at the application layer. It is executed before the network begins to operate and deliver data packets. The link quality does not affect the execution of the algorithm as long as control messages can get through the link, possibly after retransmissions when necessary if control messages cannot get through a link, then this link should not be used in the topology in the first place. A. A Simple Illustrative Test Case The first simulation is performed on the routing graph shown in Fig. 8, where a circle represents a source node, a square represents a nonsource node, and the two numbers beside a node are the initial energy (in joules) and the source rate (in packets/min), respectively. DPA itself does not dictate how the routing graph should be constructed. Instead, it can work with any routing graph that contains the potential routing paths it can choose from (see Section II). DPA works at the application level; it is independent of which MAC protocol is used. Suppose J/packet and J/packet, whicharechosenbasedontheparametersin[23]andwillbe used in all our simulations. Table I shows the lifetime vectors after the first, second, 10th, and 20th iterations of DPA, as well as the maximum lifetime vector (MLV) in the last column, which is computed numerically based on Hou s centralized algorithm [16]. The result demonstrates that the sequence of lifetime vectors produced by DPA converges rapidly toward MLV. Table II shows the source volumes that are assigned by DPA to the source nodes after the first, second, 10th, and 20th iterations, as well as the optimal source volumes that produce MLV. Recall that the source volume is the number of packets that a source can successfully deliver to the sink over its lifetime. Source has a larger lifetime than, but a smaller source volume. That is because its source rate is smaller. B. Simulation Setup for Complex Cases Unless specified otherwise, each sensor network used in the remaining simulations has 500 nodes that are randomly deployed in a area. There are 100 data sources randomly selected from the 500 sensors. Their source rates are all one packet per minute. When the network size is not 500 nodes, we change the deployment area proportionally while keeping the same node density. The sink consists of four base stations, evenly spaced along one edge of the deployment area. Each sensor has a transmission range of 100 and an initial energy of 5 J. The routing graph is constructed based on hop count. Each sensor picks its downstream neighbors from those neighbors that are one hop closer to the sink. Each of the data points used to produce the figures in this section is the average of 100 simulation runs on different random networks.

12 1198 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 21, NO. 4, AUGUST 2013 Fig. 9. Max deviation and avg deviation of lifetime vector with respect to the number of iterations that DPA has performed. Fig. 10. DPA scales well. Its overhead grows slowly with the network size. Each sensor uses up to three downstream neighbors, which are chosen from the neighbors that are one hop closer to the sink. If there are more than three such neighbors, the sensor picks three among them randomly. C. Convergence Speed of DPA The first simulation studies how quickly DPA converges its lifetime vector to the MLV, which is computed numerically based on Hou s centralized algorithm [16]. Consider the lifetime vector produced by DPA after the th iteration. We measure how much deviates from MLV by the following two metrics. Let be the lifetime of source in.let be the lifetime of in MLV. The max deviation of is defined as Fig. 11. Comparison of running time between LP and DPA. and the avg deviation is defined as Fig. 12. (left) Comparison of nodal overhead distribution between LP and DPA. (right) Comparison of maximum nodal overhead between LP and DPA. Fig. 9 shows the avg/max deviations of lifetime vectors produced by DPA on 500-node sensor networks. The deviations drop quickly to an insignificant level after a small number of iterations. For example, the avg/max deviations are merely and 0.013, respectively, after 20 iterations that means, in the worse case, the lifetime of any source deviates from its optimal value by no more than 6.6%, and on the average case, the lifetime of a source deviates from the optimal by 1.3%. D. Scalability of DPA We evaluate the scalability of DPA on random networks of nodes (with 20% being sources). We set a target (avg or max) deviation to be 0.025, 0.05, 0.075, or 0.1. We then count the number of iterations that DPA has to perform in order to produce a lifetime vector whose deviation is bounded by the target value. The simulation results are presented in Fig. 10. It shows that the overhead for DPA to satisfy a target deviation, which is measured by the number of iterations, growsslowly with the network size. Recall that a node sends at most two small control packets in each iteration. Even for a network of 3000 nodes, only 12 iterations are needed to achieve an avg deviation of 5%, and 32 iterations are needed for a max deviation of 5%. E. Comparison to Hou s Centralized Algorithm We use LP to stand for Hou s centralized algorithm [16] based on iterative linear programming. Our DPA can also be used as a centralized algorithm when the information about the network is available at the sink. The target max deviation for DPA is set to be Fig. 11 compares the running times of the two algorithms. It shows that DPA is orders of magnitude faster than LP, and the gap widens when the network size increases. Next we compare the communication overhead of the two algorithms when LP is used as a centralized algorithm while DPA is used as a distributed algorithm. For LP, the sink has to collect network information, including, for each node, source rate (4 B), node energy (4 B), transmission power (4 B), node ID, and IDs of its downstream neighbors (2 B each). The sink has also to download the resulting volume schedule to the network, which includes, for each node, its source volume and the volumes of its outgoing links (4 B each). For DPA, in every iteration, a node sends out the volumes/rates of its outgoing links and the volume bounds of its incoming links (4 B each). The communication overhead of DPA spreads evenly among all nodes. The communication overhead of LP concentrates on nodes surrounding the sink. For 5000-node random networks, the left plot in Fig. 12 shows the nodal communication overhead in ascending order. The overhead is measured by the number of bytes that a node has to transmit. Clearly, some nodes in LP (at the rightendofthefigure) bear a huge burden of communication overhead. The right plot in Fig. 12 shows the maximum nodal overhead with respect to network size. The maximum nodal overhead of LP increases much faster than that of DPA. F. Comparison to Other Centralized and Distributed Solutions We compare DPA with two additional algorithms: SLP (following the same name used in [15]) that is a linear programming

13 ZHANG et al.: MAXIMIZING LIFETIME VECTOR IN WIRELESS SENSOR NETWORKS 1199 the average of 100 simulation runs, each run removing one randomly selected node. Similarly, we repeat the simulation with 10 or 25 nodes removed. The results show that although small topology changes worsen the lifetime vector, they do so by a relatively small amount. Fig. 13. Fig. 14. Network lifetimes of DPA, SLP, and MPR. Avg and max deviations of SLP and MPR. VII. CONCLUSION We have proposed a distributed progressive algorithm for maximizing the lifetime vector in a wireless sensor network. Its design is based on the necessary and sufficient conditions that we have proved for the maximum lifetime vector. The algorithm is totally decentralized, and it improves the lifetime vector iteratively toward the maximum value. Our simulations show that the algorithm rapidly converges toward the maximum lifetime vector and significantly outperforms the existing algorithms. In this paper, we decouple routing from lifetime maximization so that the proposed algorithm can work with any underlying routing protocol, which may be predetermined based on considerations other than lifetime in practice. In our future work, we will study the related problem of finding the optimal routing strategy for the purpose of lifetime vector maximization. Some revelant heuristics can be found in [26] in the context of max-min rates. Our future work will study both heuristic and exact distributed solutions for finding the optimal routing graph. Fig. 15. Impact of small topology changes. solution for maximizing the minimum lifetime of all sources, and Minimum-Power Routing (MPR [24], [25]) that is a distributed algorithm for energy-efficient routing. First we run DPA, SLP, and MPR on 100-node random networks (with all nodes being sources). Fig. 13 compares the lifetime vectors produced by the algorithms. Each curve represents the lifetime vector in ascending order generated from one of the three algorithms. The smallest lifetime in the vector produced by DPA is more than 100% larger than the smallest lifetime in the vector by MPR. For SLP, the result shows that maximizing the minimum lifetime of sources does not maximize the lifetime vector of the network. DPA produces far better source lifetimes in the lower three quarters of the vector. Second, we compare the algorithms on larger networks. Fig. 14 shows the avg/max deviations of the lifetime vectors produced by SLP and MPR on networks of nodes (with 20% being sources). The deviations are large when comparing with those of DPA, which can be made arbitrarily small. G. Topology Change We evaluate the impact of unexpected topology change on lifetime vector. Initially, there are 500 nodes in the network, among which 100 sensors are data sources. See the simulation setup in Section VI-B. The lifetime vector of the 100 data sources is shown by the line of 500 nodes in Fig. 15, where the horizontal axis shows the sources in ascending order of their lifetimes, and the vertical axis shows the lifetimes. To simulate the impact of a node failure, we randomly select a nonsource node and remove it from the topology. The removal may cause the lifetimes of some sources to be shortened. The resulting lifetime vector is shown by the line of 1 node removed, which is VIII. ACKNOWLEDGEMENT The authors would like to thank the anonymous reviewers for their constructive comments. REFERENCES [1] D. Luo, X. Zhu, X. Wu, and G. Chen, Maximizing lifetime for the shortest path aggregation tree in wireless sensor networks, in Proc. IEEE INFOCOM, Apr. 2011, pp [2] H. Wang, N. Agoulmine, M. Ma, and Y. Jin, Network lifetime optimization in wireless sensor networks, IEEE J. Sel. Areas Commun., vol. 28, no. 7, pp , Sep [3] Y. Yun and Y. Xia, Maximizing the lifetime of wireless sensor networks with mobile sink in delay-tolerant applications, IEEE Trans. Mobile Compu., vol. 9, no. 9, pp , Sep [4] G.ZussmanandA.Segall, Energyefficient routing in ad hoc disaster recovery networks, in Proc. IEEE INFOCOM, 2003, vol. 1, pp [5] A. Sankar and Z. Liu, Maximum lifetime routing in wireless ad-hoc networks, in Proc. IEEE INFOCOM, 2004, vol. 2, pp [6] J. Zhu, S. Chen, B. Bensaou, and K.-L. Hung, Tradeoff between lifetime and rate allocation in wireless sensor networks: A cross layer approach, in Proc. IEEE INFOCOM, 2007, pp [7] Y.Wu,S.Fahmy,andN.B.Shroff, Ontheconstructionofamaximum-lifetime data gathering tree in sensor networks: NP-completeness and approximation algorithm, in Proc. IEEE INFOCOM, 2008, pp [8]Y.ShiandT.Hou, Theoreticalresults on base station movement problem for sensor networks, in Proc. IEEE INFOCOM, Apr. 2008, pp [9] F. Wang, D. Wang, and J. Liu, Traffic-aware relay node deployment: Maximizing lifetime for data collection wireless sensor networks, IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 8, pp , Aug [10] D. Blough and P. Santi, Investigating upper bounds on network lifetime extension for cell-based energy conservation techniques in stationary ad hoc networks, in Proc. ACM MobiCom, 2002, pp [11] M. Bhardwaj and A. Chandrakasan, Bounding the lifetime of sensor networks via optimal role assignments, in Proc. IEEE INFOCOM, 2002, vol. 3, pp

14 1200 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 21, NO. 4, AUGUST 2013 [12] Q.Li,J.Aslam,andD.Rus, Online power-aware routing in wireless ad-hoc networks, in Proc. ACM MobiCom, 2001, pp [13] S. Cui, R. Madan, A. J. Goldsmith, and S. Lall, Joint routing, MAC, and link layer optimization in sensor networks with energy constraints, in Proc. IEEE ICC, 2005, vol. 2, pp [14] Y. Xu, J. Heidemann, and D. Estrin, Geography-informed energy conservation for ad hoc routing, in Proc. ACM MobiCom, 2001, pp [15] Y. T. Hou, Y. Shi, and H. Sherali, On lexicographic max-min node lifetime for wireless sensor networks, in Proc. IEEE ICC, Jun. 2004, vol. 7. [16] Y. T. Hou, Y. Shi, and H. D. Sherali, Rate allocation in wireless sensor networks with network lifetime requirement, in Proc. ACM MobiHoc, 2004, pp [17] P. Bose, P. Morin, I. Stojmenovic, and J. Urrutia, Routing with guaranteed delivery in ad hoc wireless networks, in Proc. 3rd DialM, Aug. 1999, pp [18] B. Karp and H. Kung, GPSR: Greedy perimeter stateless routing for wireless networks, in Proc. ACM MobiCom, Aug. 2000, pp [19] A. Rao, S. Ratnasamy, C. Papadimitriou, S. Shenker, and I. Stoica, Geographic routing without location information, in Proc. ACM MobiCom, Apr. 2003, pp [20] S. Chen, G. Fan, and J. Cui, Avoid void in geographic routing for data aggregation in sensor networks, Int. J. Ad Hoc Ubiquitous Comput., vol. 1, no. 4, pp , Jul [21] Y. Wang, S. Lederer, and J. Gao, Connectivity-based sensor network localization with incremental Delaunay refinement method, in Proc. IEEE INFOCOM, Apr. 2009, pp [22] B. Radunovic and J. L. Boudec, A unified framework for max-min and min-max fairness with applications, in Proc. 40th Annu. Allerton Conf. Commun., Control, Comput., [23] W. Heinzelman, Application-specific protocol architecture for wireless networks, Ph.D. dissertation, MIT, Cambridge, MA, [24] S. Doshi, S. Bhandare, and T. Brown, An on-demand minimum energy routing protocol for a wireless ad hoc network, Mobile Comput. Commun. Rev., vol. 6, no. 3, pp , Jul [25] J. Gomez, A. Campbell, M. Naghshineh, and C. Bisdikian, Conserving transmission power in wireless ad hoc networks, in Proc. IEEE Int. Conf. Netw. Protocols, Nov. 2001, pp [26] R. Liu, K. Fan, Z. Zheng, and P. Sinha, Perpetual and fair data collection for environmental energy harvesting sensor networks, IEEE/ACM Trans. Netw., vol. 19, no. 4, pp , Aug Liang Zhang received the B.E. and M.E. degrees in computer science from Tsinghua University, Beijing, China, in 1999 and 2001, respectively, and theph.d. degree in computer engineering from the University of Florida, Gainesville, in He had worked with Oracle R&D Center, Beijing, China, from 2002 to Since 2008, he has been working with Juniper Networks, Sunnyvale, CA. His research interests include sensor networks, multihop wireless networks, and network security. Shigang Chen (M 02 SM 12) received the B.S. degree from the University of Science and Technology of China, Hefei, China, in 1993, and the M.S. and Ph.D. degrees from the University of Illinois at Urbana Champaign in 1996 and 1999, respectively, all in computer science. He is an Associate Professor with the Department of Computer and Information Science and Engineering, University of Florida, Gainesville. After graduation, he had worked with Cisco Systems, San Jose, CA, for three years before joining the University of Florida in He served on the technical advisory board for Protego Networks, Sunnyvale, CA, from 2002 to He published more than 100 peer-reviewed journal/conference papers. He holds 11 US patents. His research interests include computer networks, Internet security, wireless communications, and distributed computing. Dr. Chen is an Associate Editor for the IEEE/ACM TRANSACTIONS ON NETWORKING, Computer Networks, andieeetransactions ON VEHICULAR TECHNOLOGY. He has been serving in the steering committee of IEEE IWQoS since He received the IEEE Communications Society Best Tutorial Paper Award in 1999 and an NSF CAREER Award in Ying Jian received the B.E. and M.E. degrees in computer science from Tsinghua University, Beijing, China, in 2001 and 2004, respectively, and the Ph.D. degree in computer engineering from the University of Florida, Gainesville, in After graduation, he worked with Microsoft for two years and then joined Google, Mountain View, CA, in His research interests include QoS and security in multihop wireless networks and sensor networks. Yuguang Michael Fang (S 92 M 97 SM 99 F 08) received the Ph.D. degree in systems engineering from Case Western Reserve University, Cleveland, OH, in 1994, and the Ph.D. degree in electrical engineering from Boston University, Boston, MA, in He was an Assistant Professor with the Department of Electrical and Computer Engineering, New Jersey Institute of Technology, Newark, from 1998 to He then joined the Department of Electrical and Computer Engineering, University of Florida (UF), Gainesville, in 2000 as an Assistant Professor, got an early promotion to an Associate Professor with tenure in 2003, and to a Full Professor in He holds a University of Florida Research Foundation (UFRF) Professorship from 2006 to 2009, a Changjiang Scholar Chair Professorship with Xidian University,Xi an,china,from2008to2011,andaguestchairprofessorship with Tsinghua University, Beijing, China, from 2009 to He has published over 300 papers in refereed professional journals and conferences. Dr. Fang is a member of the Association for Computing Machinery (ACM). He served as the Editor-in-Chief for IEEE Wireless Communications from 2009 to 2012 and serves or has served on editorial boards of technical journals including the IEEE TRANSACTIONS ON MOBILE COMPUTING ( , 2011 present), IEEE Network (2012 present), IEEE TRANSACTIONS ON COMMUNICATIONS ( ), IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS ( ), IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS ( ), IEEE Wireless Communications Magazine ( ), and Wireless Networks (2001 present). He served on the Steering Committee for the IEEE TRANSACTIONS ON MOBILE COMPUTING from 2008 to He has been actively participating in professional conference organizations such as serving as the Technical Program Co-Chair for IEEE INOFOCOM 2014, the Steering Committee Co-Chair for QShine ( ), the Technical Program Vice-Chair for IEEE INFOCOM 2005, the Technical Program Area Chair for IEEE INFOCOM ( ), Technical Program Symposium Co-Chair for IEEE GLOBECOM 2004, and a member of Technical Program Committee for IEEE INFOCOM (1998, 2000, ). He received the National Science Foundation Faculty Early Career Award in 2001 and the Office of Naval Research Young Investigator Award in He is the recipient of the Best Paper Award in IEEE GLOBECOM 2011 and the IEEE International Conference on Network Protocols (ICNP, 2006) and the recipient of the IEEE TCGN Best Paper Award in the IEEE High-Speed Networks Symposium, IEEE GLOBECOM He has also received a UF Doctoral Dissertation Advisor/Mentoring Award, a 2011 Florida Blue Key/UF Homecoming Distinguished Faculty Award, and the 2009 UF College of Engineering Faculty Mentoring Award. Zhen Mo received the B.E degree in information security engineering and M.E. degree in theory and new technology of electrical engineering from Shanghai Jiao Tong University, Shanghai, China, in 2007 and 2010, and is currently pursuing the Ph.D. degree computer and information science engineering at the University of Florida, Gainesville. His research interests include network security and cloud computing security.

Distributed Progressive Algorithm for Maximizing Lifetime Vector in Wireless Sensor Networks

Distributed Progressive Algorithm for Maximizing Lifetime Vector in Wireless Sensor Networks Distributed Progressive Algorithm for Maximizing Lifetime Vector in Wireless Sensor Networks Liang Zhang Shigang Chen Ying Jian Yuguang Fang Department of Computer & Information Science & Engineering,

More information

FUTURE communication networks are expected to support

FUTURE communication networks are expected to support 1146 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 13, NO 5, OCTOBER 2005 A Scalable Approach to the Partition of QoS Requirements in Unicast and Multicast Ariel Orda, Senior Member, IEEE, and Alexander Sprintson,

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS

OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS Chapter 2 OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS Hanan Luss and Wai Chen Telcordia Technologies, Piscataway, New Jersey 08854 hluss@telcordia.com, wchen@research.telcordia.com Abstract:

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

MAX-MIN FAIRNESS is a simple, well-recognized

MAX-MIN FAIRNESS is a simple, well-recognized IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 1073 A Unified Framework for Max-Min and Min-Max Fairness With Applications Božidar Radunović, Member, IEEE, and Jean-Yves Le Boudec, Fellow,

More information

On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path

On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path Guoqiang Mao, Lixiang Xiong, and Xiaoyuan Ta School of Electrical and Information Engineering The University of Sydney NSW 2006, Australia

More information

Maximum Data Gathering in Networked Sensor Systems

Maximum Data Gathering in Networked Sensor Systems Maximum Data Gathering in Networked Sensor Systems Bo Hong and Viktor K. Prasanna University of Southern Calinia, Los Angeles CA 90089-2562 bohong, prasanna @usc.edu Abstract We focus on data gathering

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

904 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 4, AUGUST 2008

904 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 4, AUGUST 2008 904 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 4, AUGUST 2008 Optimizing Lifetime for Continuous Data Aggregation With Precision Guarantees in Wireless Sensor Networks Xueyan Tang, Member, IEEE,

More information

1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based

1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based 1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST 2010 Network Coding-Aware Routing in Wireless Networks Sudipta Sengupta, Senior Member, IEEE, Shravan Rayanchu, and Suman Banerjee, Member,

More information

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS 1 K MADHURI, 2 J.KRISHNA, 3 C.SIVABALAJI II M.Tech CSE, AITS, Asst Professor CSE, AITS, Asst Professor CSE, NIST

More information

IN a mobile ad hoc network, nodes move arbitrarily.

IN a mobile ad hoc network, nodes move arbitrarily. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 6, JUNE 2006 609 Distributed Cache Updating for the Dynamic Source Routing Protocol Xin Yu Abstract On-demand routing protocols use route caches to make

More information

13 Sensor networks Gathering in an adversarial environment

13 Sensor networks Gathering in an adversarial environment 13 Sensor networks Wireless sensor systems have a broad range of civil and military applications such as controlling inventory in a warehouse or office complex, monitoring and disseminating traffic conditions,

More information

An Iterative Greedy Approach Using Geographical Destination Routing In WSN

An Iterative Greedy Approach Using Geographical Destination Routing In WSN ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference

More information

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver 1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Solution for Homework set 3

Solution for Homework set 3 TTIC 300 and CMSC 37000 Algorithms Winter 07 Solution for Homework set 3 Question (0 points) We are given a directed graph G = (V, E), with two special vertices s and t, and non-negative integral capacities

More information

Dual Power Management for Network Connectivity in Wireless Sensor Networks

Dual Power Management for Network Connectivity in Wireless Sensor Networks Dual Power Management for Network Connectivity in Wireless Sensor Networks Yanxia Rong, Hongsik Choi and Hyeong-Ah Choi Department of Computer Science George Washington University Washington DC Department

More information

A Distributed Optimization Algorithm for Multi-hop Cognitive Radio Networks

A Distributed Optimization Algorithm for Multi-hop Cognitive Radio Networks A Distributed Optimization Algorithm for Multi-hop Cognitive Radio Networks Yi Shi Y. Thomas Hou The Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, VA Abstract Cognitive

More information

MOST attention in the literature of network codes has

MOST attention in the literature of network codes has 3862 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 8, AUGUST 2010 Efficient Network Code Design for Cyclic Networks Elona Erez, Member, IEEE, and Meir Feder, Fellow, IEEE Abstract This paper introduces

More information

Algorithms for Provisioning Virtual Private Networks in the Hose Model

Algorithms for Provisioning Virtual Private Networks in the Hose Model IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 4, AUGUST 2002 565 Algorithms for Provisioning Virtual Private Networks in the Hose Model Amit Kumar, Rajeev Rastogi, Avi Silberschatz, Fellow, IEEE, and

More information

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Ewa Kusmierek and David H.C. Du Digital Technology Center and Department of Computer Science and Engineering University of Minnesota

More information

Dynamic Cooperative Routing (DCR) in Wireless Sensor Networks

Dynamic Cooperative Routing (DCR) in Wireless Sensor Networks Dynamic Cooperative Routing () in Wireless Sensor Networks Sivasankari H. 1, Leelavathi R. 1, Shaila K. 1, Venugopal K.R. 1, S.S. Iyengar 2, and L.M. Patnaik 3 1 Department of Computer Science and Engineering,

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia

More information

Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks

Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department RPI Mobile Wireless Networks Wireless nodes

More information

Constructing Maximum-Lifetime Data Gathering Forests in Sensor Networks

Constructing Maximum-Lifetime Data Gathering Forests in Sensor Networks 1 Constructing Maximum-Lifetime Data Gathering Forests in Sensor Networks Yan Wu, Zhoujia Mao, Sonia Fahmy, Ness B. Shroff E-mail: yanwu@microsoft.com, maoz@ece.osu.edu, fahmy@cs.purdue.edu, shroff@ece.osu.edu

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Lecture 20 : Trees DRAFT

Lecture 20 : Trees DRAFT CS/Math 240: Introduction to Discrete Mathematics 4/12/2011 Lecture 20 : Trees Instructor: Dieter van Melkebeek Scribe: Dalibor Zelený DRAFT Last time we discussed graphs. Today we continue this discussion,

More information

Utility-Based Rate Control in the Internet for Elastic Traffic

Utility-Based Rate Control in the Internet for Elastic Traffic 272 IEEE TRANSACTIONS ON NETWORKING, VOL. 10, NO. 2, APRIL 2002 Utility-Based Rate Control in the Internet for Elastic Traffic Richard J. La and Venkat Anantharam, Fellow, IEEE Abstract In a communication

More information

Energy Aware Node Placement Algorithm for Wireless Sensor Network

Energy Aware Node Placement Algorithm for Wireless Sensor Network Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 6 (2014), pp. 541-548 Research India Publications http://www.ripublication.com/aeee.htm Energy Aware Node Placement Algorithm

More information

/ Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang

/ Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang 600.469 / 600.669 Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang 9.1 Linear Programming Suppose we are trying to approximate a minimization

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,

More information

Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks

Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks Ayad Salhieh Department of Electrical and Computer Engineering Wayne State University Detroit, MI 48202 ai4874@wayne.edu Loren

More information

Image Transmission in Sensor Networks

Image Transmission in Sensor Networks Image Transmission in Sensor Networks King-Shan Lui and Edmund Y. Lam Department of Electrical and Electronic Engineering The University of Hong Kong Pokfulam Road, Hong Kong, China Email {kslui,elam}@eee.hku.hk

More information

Event Driven Routing Protocols For Wireless Sensor Networks

Event Driven Routing Protocols For Wireless Sensor Networks Event Driven Routing Protocols For Wireless Sensor Networks Sherif Moussa 1, Ghada Abdel Halim 2, Salah Abdel-Mageid 2 1 Faculty of Engineering, Canadian University Dubai, Dubai, UAE. 2 Faculty of Engineering,

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols 1 Why can t we use conventional routing algorithms here?? A sensor node does not have an identity (address) Content based and data centric

More information

Lecture 4 Wide Area Networks - Routing

Lecture 4 Wide Area Networks - Routing DATA AND COMPUTER COMMUNICATIONS Lecture 4 Wide Area Networks - Routing Mei Yang Based on Lecture slides by William Stallings 1 ROUTING IN PACKET SWITCHED NETWORK key design issue for (packet) switched

More information

CSE 417 Network Flows (pt 4) Min Cost Flows

CSE 417 Network Flows (pt 4) Min Cost Flows CSE 417 Network Flows (pt 4) Min Cost Flows Reminders > HW6 is due Monday Review of last three lectures > Defined the maximum flow problem find the feasible flow of maximum value flow is feasible if it

More information

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication Vol., Issue.3, May-June 0 pp--7 ISSN: - Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication J. Divakaran, S. ilango sambasivan Pg student, Sri Shakthi Institute of

More information

A Connection between Network Coding and. Convolutional Codes

A Connection between Network Coding and. Convolutional Codes A Connection between Network Coding and 1 Convolutional Codes Christina Fragouli, Emina Soljanin christina.fragouli@epfl.ch, emina@lucent.com Abstract The min-cut, max-flow theorem states that a source

More information

IP Multicast Technology Overview

IP Multicast Technology Overview IP multicast is a bandwidth-conserving technology that reduces traffic by delivering a single stream of information simultaneously to potentially thousands of businesses and homes. Applications that take

More information

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 56, NO. 3, MAY

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 56, NO. 3, MAY IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 56, NO. 3, MAY 2007 1333 Multicast Communications in Ad Hoc Networks Using Directional Antennas: A Lifetime-Centric Approach Y. Thomas Hou, Senior Member,

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

D-Optimal Designs. Chapter 888. Introduction. D-Optimal Design Overview

D-Optimal Designs. Chapter 888. Introduction. D-Optimal Design Overview Chapter 888 Introduction This procedure generates D-optimal designs for multi-factor experiments with both quantitative and qualitative factors. The factors can have a mixed number of levels. For example,

More information

Unit 2 Packet Switching Networks - II

Unit 2 Packet Switching Networks - II Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source

More information

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis and Enhancement of Routing Protocol in Manet Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

More information

Fig. 2: Architecture of sensor node

Fig. 2: Architecture of sensor node Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com To Reduce

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product Available online at www.sciencedirect.com ScienceDirect IERI Procedia 10 (2014 ) 153 159 2014 International Conference on Future Information Engineering Achieve Significant Throughput Gains in Wireless

More information

Lecture 2 September 3

Lecture 2 September 3 EE 381V: Large Scale Optimization Fall 2012 Lecture 2 September 3 Lecturer: Caramanis & Sanghavi Scribe: Hongbo Si, Qiaoyang Ye 2.1 Overview of the last Lecture The focus of the last lecture was to give

More information

Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

More information

PERSONAL communications service (PCS) provides

PERSONAL communications service (PCS) provides 646 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 5, NO. 5, OCTOBER 1997 Dynamic Hierarchical Database Architecture for Location Management in PCS Networks Joseph S. M. Ho, Member, IEEE, and Ian F. Akyildiz,

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

LECTURES 3 and 4: Flows and Matchings

LECTURES 3 and 4: Flows and Matchings LECTURES 3 and 4: Flows and Matchings 1 Max Flow MAX FLOW (SP). Instance: Directed graph N = (V,A), two nodes s,t V, and capacities on the arcs c : A R +. A flow is a set of numbers on the arcs such that

More information

Treewidth and graph minors

Treewidth and graph minors Treewidth and graph minors Lectures 9 and 10, December 29, 2011, January 5, 2012 We shall touch upon the theory of Graph Minors by Robertson and Seymour. This theory gives a very general condition under

More information

Network Routing - II Failures, Recovery, and Change

Network Routing - II Failures, Recovery, and Change MIT 6.02 DRAFT Lecture Notes Spring 2009 (Last update: April 27, 2009) Comments, questions or bug reports? Please contact Hari Balakrishnan (hari@mit.edu) or 6.02-staff@mit.edu LECTURE 21 Network Routing

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

CMPSCI 311: Introduction to Algorithms Practice Final Exam

CMPSCI 311: Introduction to Algorithms Practice Final Exam CMPSCI 311: Introduction to Algorithms Practice Final Exam Name: ID: Instructions: Answer the questions directly on the exam pages. Show all your work for each question. Providing more detail including

More information

BCN Decision and Risk Analysis. Syed M. Ahmed, Ph.D.

BCN Decision and Risk Analysis. Syed M. Ahmed, Ph.D. Linear Programming Module Outline Introduction The Linear Programming Model Examples of Linear Programming Problems Developing Linear Programming Models Graphical Solution to LP Problems The Simplex Method

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

Worst-case Ethernet Network Latency for Shaped Sources

Worst-case Ethernet Network Latency for Shaped Sources Worst-case Ethernet Network Latency for Shaped Sources Max Azarov, SMSC 7th October 2005 Contents For 802.3 ResE study group 1 Worst-case latency theorem 1 1.1 Assumptions.............................

More information

CURRENT routing schemes typically focus on discovering

CURRENT routing schemes typically focus on discovering IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 2, APRIL 2007 413 Multipath Routing Algorithms for Congestion Minimization Ron Banner, Senior Member, IEEE, and Ariel Orda, Fellow, IEEE Abstract Unlike

More information

CS 204 Lecture Notes on Elementary Network Analysis

CS 204 Lecture Notes on Elementary Network Analysis CS 204 Lecture Notes on Elementary Network Analysis Mart Molle Department of Computer Science and Engineering University of California, Riverside CA 92521 mart@cs.ucr.edu October 18, 2006 1 First-Order

More information

Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1

Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1 Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1 HAI THANH MAI AND MYOUNG HO KIM Department of Computer Science Korea Advanced Institute of Science

More information

1472 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 5, OCTOBER 2011

1472 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 5, OCTOBER 2011 1472 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 5, OCTOBER 2011 Achieving MAC-Layer Fairness in CSMA/CA Networks Ying Jian, Ming Zhang, Student Member, IEEE, and Shigang Chen, Member, IEEE Abstract

More information

Lecture 3: Graphs and flows

Lecture 3: Graphs and flows Chapter 3 Lecture 3: Graphs and flows Graphs: a useful combinatorial structure. Definitions: graph, directed and undirected graph, edge as ordered pair, path, cycle, connected graph, strongly connected

More information

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS International Journal of Wireless Communications and Networking 3(1), 2011, pp. 7-13 CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS Sudhanshu Pant 1, Naveen Chauhan 2 and Brij Bihari Dubey 3 Department

More information

Mobile Element Scheduling for Efficient Data Collection in Wireless Sensor Networks: A Survey

Mobile Element Scheduling for Efficient Data Collection in Wireless Sensor Networks: A Survey Journal of Computer Science 7 (1): 114-119, 2011 ISSN 1549-3636 2011 Science Publications Mobile Element Scheduling for Efficient Data Collection in Wireless Sensor Networks: A Survey K. Indra Gandhi and

More information

NETWORK coding is an area that has emerged in 2000 [1],

NETWORK coding is an area that has emerged in 2000 [1], 450 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 2, APRIL 2008 Efficient Broadcasting Using Network Coding Christina Fragouli, Jörg Widmer, and Jean-Yves Le Boudec, Fellow, IEEE Abstract We consider

More information

Survey on Reliability Control Using CLR Method with Tour Planning Mechanism in WSN

Survey on Reliability Control Using CLR Method with Tour Planning Mechanism in WSN Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.854

More information

FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions

FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions Young-Mi Song, Sung-Hee Lee, and Young-Bae Ko College of Information and Communication, Ajou University,

More information

Maximizing Network Utilization with Max-Min Fairness in Wireless Sensor Networks

Maximizing Network Utilization with Max-Min Fairness in Wireless Sensor Networks 1 Maximizing Network Utilization with Max-Min Fairness in Wireless Sensor Networks Avinash Sridharan and Bhaskar Krishnamachari {asridhar,bkrishna}@usc.edu Department of Electrical Engineering University

More information

William Stallings Data and Computer Communications 7 th Edition. Chapter 12 Routing

William Stallings Data and Computer Communications 7 th Edition. Chapter 12 Routing William Stallings Data and Computer Communications 7 th Edition Chapter 12 Routing Routing in Circuit Switched Network Many connections will need paths through more than one switch Need to find a route

More information

Alternate Routing Diagram

Alternate Routing Diagram 68 0 Computer Networks Chapter Routing Routing in Circuit Switched Network Many connections will need paths through more than one switch Need to find a route Efficiency Resilience Public telephone switches

More information

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Mr. V. Narsing Rao 1, Dr.K.Bhargavi 2 1,2 Asst. Professor in CSE Dept., Sphoorthy Engineering College, Hyderabad Abstract- Wireless Sensor

More information

206 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 1, FEBRUARY The RGA arbitration can also start from the output side like in DRR [13] and

206 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 1, FEBRUARY The RGA arbitration can also start from the output side like in DRR [13] and 206 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 1, FEBRUARY 2008 Matching From the First Iteration: An Iterative Switching Algorithm for an Input Queued Switch Saad Mneimneh Abstract An iterative

More information

Stochastic Control of Path Optimization for Inter-Switch Handoffs in Wireless ATM Networks

Stochastic Control of Path Optimization for Inter-Switch Handoffs in Wireless ATM Networks 336 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 9, NO. 3, JUNE 2001 Stochastic Control of Path Optimization for Inter-Switch Handoffs in Wireless ATM Networks Vincent W. S. Wong, Member, IEEE, Mark E. Lewis,

More information

Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks

Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks Aswathy M.V & Sreekantha Kumar V.P CSE Dept, Anna University, KCG College of Technology, Karappakkam,Chennai E-mail : aswathy.mv1@gmail.com,

More information

Routing. 4. Mar INF-3190: Switching and Routing

Routing. 4. Mar INF-3190: Switching and Routing Routing 4. Mar. 004 1 INF-3190: Switching and Routing Routing: Foundations! Task! To define the route of packets through the network! From the source! To the destination system! Routing algorithm! Defines

More information

Estimating the Free Region of a Sensor Node

Estimating the Free Region of a Sensor Node Estimating the Free Region of a Sensor Node Laxmi Gewali, Navin Rongratana, Jan B. Pedersen School of Computer Science, University of Nevada 4505 Maryland Parkway Las Vegas, NV, 89154, USA Abstract We

More information

Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks

Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks S. Gokilarani 1, P. B. Pankajavalli 2 1 Research Scholar, Kongu Arts and Science College,

More information

A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks

A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks Jing Ai, Damla Turgut, and Ladislau Bölöni Networking and Mobile Computing Research Laboratory (NetMoC) Department of Electrical

More information

6. Lecture notes on matroid intersection

6. Lecture notes on matroid intersection Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans May 2, 2017 6. Lecture notes on matroid intersection One nice feature about matroids is that a simple greedy algorithm

More information

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks William Shaw 1, Yifeng He 1, and Ivan Lee 1,2 1 Department of Electrical and Computer Engineering, Ryerson University, Toronto,

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN: Fast Data Collection with Reduced Interference and Increased Life Time in Wireless Sensor Networks Jayachandran.J 1 and Ramalakshmi.R 2 1 M.Tech Network Engineering, Kalasalingam University, Krishnan koil.

More information

Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks. Wang Wei Vikram Srinivasan Chua Kee-Chaing

Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks. Wang Wei Vikram Srinivasan Chua Kee-Chaing Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks Wang Wei Vikram Srinivasan Chua Kee-Chaing Overview The motivation of mobile relay The performance analysis for mobile relay in the

More information

THE goal of quality-of-service (QoS) routing is to find a

THE goal of quality-of-service (QoS) routing is to find a IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 12, NO. 1, FEBRUARY 2004 17 Routing With Topology Aggregation in Delay-Bandwidth Sensitive Networks King-Shan Lui, Member, IEEE, Klara Nahrstedt, Member, IEEE,

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

Clustering Using Graph Connectivity

Clustering Using Graph Connectivity Clustering Using Graph Connectivity Patrick Williams June 3, 010 1 Introduction It is often desirable to group elements of a set into disjoint subsets, based on the similarity between the elements in the

More information

ECE 333: Introduction to Communication Networks Fall 2001

ECE 333: Introduction to Communication Networks Fall 2001 ECE : Introduction to Communication Networks Fall 00 Lecture : Routing and Addressing I Introduction to Routing/Addressing Lectures 9- described the main components of point-to-point networks, i.e. multiplexed

More information

876 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 14, NO. 4, AUGUST 2006

876 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 14, NO. 4, AUGUST 2006 876 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 14, NO. 4, AUGUST 2006 Network Classless Time Protocol Based on Clock Offset Optimization Omer Gurewitz, Member, IEEE, Israel Cidon, Senior Member, IEEE, Moshe

More information

On the Robustness of Distributed Computing Networks

On the Robustness of Distributed Computing Networks 1 On the Robustness of Distributed Computing Networks Jianan Zhang, Hyang-Won Lee, and Eytan Modiano Lab for Information and Decision Systems, Massachusetts Institute of Technology, USA Dept. of Software,

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS Tzu-Chiang Chiang,, Ching-Hung Yeh, Yueh-Min Huang and Fenglien Lee Department of Engineering Science, National Cheng-Kung University, Taiwan,

More information

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani Centre for Telecommunication and Information Engineering Monash University,

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

Market Splitting Algorithm for Congestion Management in Electricity Spot Market

Market Splitting Algorithm for Congestion Management in Electricity Spot Market Proceedings of the 6th WSEAS International Conference on Power Systems, Lisbon, Portugal, September 22-24, 2006 338 Market Splitting Algorithm for Congestion Management in Electricity Spot Market Marta

More information